This document discusses how higher education institutions have led the way in addressing emerging IT issues like BYOD, cloud computing, big data, and mobility with limited budgets. It provides examples of how universities have supported a wide variety of student-owned devices and driven innovation through large research projects involving collaboration and data sharing. The document suggests enterprises can learn lessons from higher education's experiences in areas like policy, productivity focus, multi-tenancy infrastructure sharing, and driving technology innovation through ambitious projects.
You know technology is truly functional when you don't need to get off the sofa, be that to change channels, make a call, order your daily bread or even earn your daily bread, and it looks like we're finally getting there. A keen chronicler of the changing times since he got his first programmable calculator in 1978, Philip Anthony, head of Co-Operative Systems, talks about his personal journey, daily battles with technology and where we might be headed. Often the results of applying technology are not as anticipated ...
A survey of Cyber Foraging and Cloud Offload Techniques.
We present a survey of cyber foraging and
cloud computing techniques as a solution to aid computing on resource-constrained mobile devices. We also explain some
important cyber foraging systems and present a categorization of the existing approaches considering various factors like
their dynamics, granularity, metrics used, surrogate types and their overheads.
You know technology is truly functional when you don't need to get off the sofa, be that to change channels, make a call, order your daily bread or even earn your daily bread, and it looks like we're finally getting there. A keen chronicler of the changing times since he got his first programmable calculator in 1978, Philip Anthony, head of Co-Operative Systems, talks about his personal journey, daily battles with technology and where we might be headed. Often the results of applying technology are not as anticipated ...
A survey of Cyber Foraging and Cloud Offload Techniques.
We present a survey of cyber foraging and
cloud computing techniques as a solution to aid computing on resource-constrained mobile devices. We also explain some
important cyber foraging systems and present a categorization of the existing approaches considering various factors like
their dynamics, granularity, metrics used, surrogate types and their overheads.
Next Generation Innovation Platform for Research and Economic Development in ...Ed Dodds
Eric Boyd, Internet2, Over the past 25 years, the modern Internet evolved in labs and dorms at R&E-enabled campuses, leading to the creation of large and successful companies such as Cisco, Mosaic, Facebook, Google, and Box. The pervasive bandwidth-rich environment found on campuses incubated technology development and enabled the creation of large scale early adopter communities that evolved into the Internet-centered commercial markets that exist today. The R&E Community has opportunity to once again serve as the laboratory for Internet innovation, and Internet2 is investing heavily in the resources needed by the R&E community to begin that new era of innovation. By recreating the bandwidth advantage historically held by R&E institutions and opening the network software stack to innovation, Internet2 seeks to create a new bandwidth-rich, programmable network for science, scholarship and service. This talk will cover Internet2's investment in the Network Development and Deployment Initiative (NDDI) in partnership with Indiana University and the Clean Slate Program at Stanford University. It will give details on the new opportunities for network innovation at R&E campuses enabled by the NDDI substrate, such as the recently launched Open Science, Services, and Scholarship Exchange (OS3E). It will also talk about how this creates an environment to support both scientific research and network research in labs and dorm rooms across the country and around the globe.
Hardware/Software Interoperability and Single Point Vulnerability Problems of...BRNSS Publication Hub
As reiterated by many authors, internet of things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data, creating opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions. This is made possible by the communications models with the enabling technologies which make communications possible among IoT connected devices, although, with drawbacks. These drawbacks are the major reasons for adoption problems of IoT services by the society. This paper carried out an investigative study on previous works on the societal applications and adoption problems of IoT, IoT communications models, and pros and cons of IoT. Through the study, it was revealed that for IoT devices and services to be widely adopted with no or minimal problems, future IoT technology will not only address the known drawbacks but also will require hardware and software components that are highly interoperable, dependable, reconfigurable, and, in many applications, certifiable.
Brace Yourselves Because The Internet of Things Is ComingCherwell Software
Amy DeMartine, Senior Analyst Forrester— Her research focus is on IT service management and IT asset management, including topics such as knowledge management, collaboration opportunities, and customer experience management. Amy helps IT organizations improve their customer experience with their lines of business by analyzing paradigm shifts in the services and support IT provides.
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012Livingstone Advisory
Many Cloud computing evangelists believe that the conventional enterprise IT service delivery model is dead and almost buried. The new ‘IT democracy spring’ is being fueled by influences such as the ready access to user friendly public Cloud applications, perceptions of low cost and speed of deployment.
On the other hand, the reality is that the vast majority of well-run enterprise IT departments were never really dictatorships, and were never comfortable being branded as such. Nevertheless many observers feel that enterprise IT is under siege, with the skies slowly filling with ‘as-a-service’ vendors circling high above, ready to make the most of the opportunities.
The reality is that Cloud computing, in all its various forms, is reshaping the way both business and IT thinks about service delivery. For the first time since the advent of the personal computer, business users who consume IT services now have a real choice: If enterprise IT cannot provide them with the services they require in a speedy and cost-effective manner, they'll simply go elsewhere.
This keynote session explored the transformation occurring in and around enterprise IT departments and how organisation, IT department and individuals alike can all benefit from the new way of managing and delivering IT services that modern organisations, want, need and feel they are entitled to.
Presentation by Chisholm and Harper as part of the Victoria Online Seminar Series, Tuesday 26 July 2011. The trends covered include: HTML5; Augmented reality; Cloud computing; Game mechanics; Next generation search; Agile development; Social technology; and Mobile internet.
Carsten Sorensen - Big data: de la investigación científica a la gestión empr...Fundación Ramón Areces
El 3 de julio de 2014, organizamos en la Fundación Ramón Areces una jornada con el lema 'Big Data: de la investigación científica a la gestión empresarial'. En ella estudiamos los retos y oportunidades del Big data en las ciencias sociales, en la economía y en la gestión empresarial. Entre otros ponentes, acudieron expertos de la London School of Economics, BBVA, Deloite, Universidades de Valencia y Oviedo, el Centro Nacional de Supercomputación...
User Innovation for the Internet of Things | Gerd KortuemGerd Kortuem
The importance of user innovation is widely accepted, but the development of the Internet of Things is primarily driven by large commercial players. Using an innovation perspective, this paper identifies how user innovation and market-based innovation can be combined by creating user- centered ecosystems that are open for and provide incentives for end-user innovation. An investigation of the smart-home domain is used to identify challenges for the realization of user-centered ecosystems for the Internet of Things.
Strategic Relevance of the Internet Science Network of Excellence to Future I...i_scienceEU
The Network of Excellence in Internet Science aims to achieve a deeper multidisciplinary understanding of the Internet as a societal and technological artefact.
More information: http://internet-science.eu/
Twitter: @i_scienceEU
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
Embracing & Securing the Internet of Things
A briefing for CIOs at the CIO Dialogue 9 Oxford. May 2014
Presenter: Adrian Wright
VP of Research - Information Systems Security Association
CEO of Secoda Risk Management
Next Generation Innovation Platform for Research and Economic Development in ...Ed Dodds
Eric Boyd, Internet2, Over the past 25 years, the modern Internet evolved in labs and dorms at R&E-enabled campuses, leading to the creation of large and successful companies such as Cisco, Mosaic, Facebook, Google, and Box. The pervasive bandwidth-rich environment found on campuses incubated technology development and enabled the creation of large scale early adopter communities that evolved into the Internet-centered commercial markets that exist today. The R&E Community has opportunity to once again serve as the laboratory for Internet innovation, and Internet2 is investing heavily in the resources needed by the R&E community to begin that new era of innovation. By recreating the bandwidth advantage historically held by R&E institutions and opening the network software stack to innovation, Internet2 seeks to create a new bandwidth-rich, programmable network for science, scholarship and service. This talk will cover Internet2's investment in the Network Development and Deployment Initiative (NDDI) in partnership with Indiana University and the Clean Slate Program at Stanford University. It will give details on the new opportunities for network innovation at R&E campuses enabled by the NDDI substrate, such as the recently launched Open Science, Services, and Scholarship Exchange (OS3E). It will also talk about how this creates an environment to support both scientific research and network research in labs and dorm rooms across the country and around the globe.
Hardware/Software Interoperability and Single Point Vulnerability Problems of...BRNSS Publication Hub
As reiterated by many authors, internet of things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data, creating opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions. This is made possible by the communications models with the enabling technologies which make communications possible among IoT connected devices, although, with drawbacks. These drawbacks are the major reasons for adoption problems of IoT services by the society. This paper carried out an investigative study on previous works on the societal applications and adoption problems of IoT, IoT communications models, and pros and cons of IoT. Through the study, it was revealed that for IoT devices and services to be widely adopted with no or minimal problems, future IoT technology will not only address the known drawbacks but also will require hardware and software components that are highly interoperable, dependable, reconfigurable, and, in many applications, certifiable.
Brace Yourselves Because The Internet of Things Is ComingCherwell Software
Amy DeMartine, Senior Analyst Forrester— Her research focus is on IT service management and IT asset management, including topics such as knowledge management, collaboration opportunities, and customer experience management. Amy helps IT organizations improve their customer experience with their lines of business by analyzing paradigm shifts in the services and support IT provides.
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012Livingstone Advisory
Many Cloud computing evangelists believe that the conventional enterprise IT service delivery model is dead and almost buried. The new ‘IT democracy spring’ is being fueled by influences such as the ready access to user friendly public Cloud applications, perceptions of low cost and speed of deployment.
On the other hand, the reality is that the vast majority of well-run enterprise IT departments were never really dictatorships, and were never comfortable being branded as such. Nevertheless many observers feel that enterprise IT is under siege, with the skies slowly filling with ‘as-a-service’ vendors circling high above, ready to make the most of the opportunities.
The reality is that Cloud computing, in all its various forms, is reshaping the way both business and IT thinks about service delivery. For the first time since the advent of the personal computer, business users who consume IT services now have a real choice: If enterprise IT cannot provide them with the services they require in a speedy and cost-effective manner, they'll simply go elsewhere.
This keynote session explored the transformation occurring in and around enterprise IT departments and how organisation, IT department and individuals alike can all benefit from the new way of managing and delivering IT services that modern organisations, want, need and feel they are entitled to.
Presentation by Chisholm and Harper as part of the Victoria Online Seminar Series, Tuesday 26 July 2011. The trends covered include: HTML5; Augmented reality; Cloud computing; Game mechanics; Next generation search; Agile development; Social technology; and Mobile internet.
Carsten Sorensen - Big data: de la investigación científica a la gestión empr...Fundación Ramón Areces
El 3 de julio de 2014, organizamos en la Fundación Ramón Areces una jornada con el lema 'Big Data: de la investigación científica a la gestión empresarial'. En ella estudiamos los retos y oportunidades del Big data en las ciencias sociales, en la economía y en la gestión empresarial. Entre otros ponentes, acudieron expertos de la London School of Economics, BBVA, Deloite, Universidades de Valencia y Oviedo, el Centro Nacional de Supercomputación...
User Innovation for the Internet of Things | Gerd KortuemGerd Kortuem
The importance of user innovation is widely accepted, but the development of the Internet of Things is primarily driven by large commercial players. Using an innovation perspective, this paper identifies how user innovation and market-based innovation can be combined by creating user- centered ecosystems that are open for and provide incentives for end-user innovation. An investigation of the smart-home domain is used to identify challenges for the realization of user-centered ecosystems for the Internet of Things.
Strategic Relevance of the Internet Science Network of Excellence to Future I...i_scienceEU
The Network of Excellence in Internet Science aims to achieve a deeper multidisciplinary understanding of the Internet as a societal and technological artefact.
More information: http://internet-science.eu/
Twitter: @i_scienceEU
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
Embracing & Securing the Internet of Things
A briefing for CIOs at the CIO Dialogue 9 Oxford. May 2014
Presenter: Adrian Wright
VP of Research - Information Systems Security Association
CEO of Secoda Risk Management
The Internet of Things arrived last decade when the number of devices (that can connect) outnumbered the world population. We have now entered a new age. The evolution from #virtualization to #cloud to #IoT and #BigData a consequence of the Moore Nielsen prediction and the rise of Fog Computing. The role of #OpenSource and #OpenStandards and the importance of the new trend: Open Data as the only way to keep sanity in Big Data. This is my presentation at the IEEE International Conference on Cloud Engineering in Boston on Pi Day 2014
Speaking at John Carrol University on the Internet of ThingsJustin Grammens
I was honored to have been invited to speak at John Carroll University on “The Internet of Things - Making the Physical World Smarter.” It was an extremely fun and engaging audience and I enjoyed every minute of the presentation. I hope you enjoy it as well and please don't hesitate to reach out with any questions.
The Internet of Things (IoT) is a concept that describes a totally interconnected world. It’s a world where devices of every shape and size are manufactured with “smart” capabilities that allow them to communicate and interact with other devices, exchange data, make autonomous decisions and perform useful tasks based on preset conditions.
IoT is expected to gross over $19 trillion over the next few years. However, the problem is that these ‘things’ have myths surrounding them, some of which are impacting how organizations develop the apps to support them.
Any new technology involves a certain amount of uncertainty and business risk. In the case of the Internet of Things, however, many of the risks have been exaggerated or misrepresented. While the IoT vision will take years to mature fully, the building blocks to begin this process are already in place.
Key hardware and software are either available today or under development; stakeholders need to address security and privacy concerns, and collaborate to implement the open standards that will make the IoT safe, secure, reliable and interoperable, and allow the delivery of secured services as seamlessly as possible.
This was a 30 min talk intended as one of the opening/overview presentations before a full-day deep dive into ScienceDMZ design patterns and architectures.
Direct downloads are not enabled. Contact me directly (chris@bioteam.net) if you for some odd reason want a copy of this slide deck!
This slide was presented for the fulfillment of the course Bachelor in Information Management, Affiliated to TU, Kathmandu Nepal at Thames International College, Old-Baneshwor, KTM, Nepal.
1. IT Services in Higher Education – what Enterprise
can learn from the Universities
2. Industry Hot Topics – does it all seem familiar?
• Cloud Computing (and SDN)
• BYOD/T/S
• The “internet of things”
• Mobility (consumerization)
• Consumption based service provision
• Multi – tenancy
• Virtualisation
• HPC
• “Big” Data
2
3. BYO – the hottest topic of all
Some numbers
• 95% of organizations allow employee-owned devices in the workplace
• 84% of respondents also provide some support
• 36% provide full support for ANY device
• By 2014, the average connected devices per white collar worker will be 3.3
Why is this happening in the enterprise at all?
• 76% of IT Leaders consider BYO to be “very” or “extremely” positive..
• Benefits of between $300 and $1300 per employee are estimated
Why is this really happening in the enterprise at all?
• 69% of employees want to use “unapproved” applications at work
• 40% cited “device choice” as their top reason – above “work capability”
• The CxO factor
Sources Cisco / Absolute Software / BBC
3
5. BYO = BAU for HE
• Residential students have always “Brought their own”
• Universities very rarely have separate infrastructure
• Universities always support pretty much whatever arrives
• Student populations are among the most demanding user demographics
• Research and Academic populations are THE most demanding demographic
• Universities get both, and have to work with limited funds
• These challenges have been met by HE for many years, before “BYO” was coined
So do we actually need special “BYO” technology in the enterprise?
5
8. The lessons we take from HE to BYO
• Understand your existing environment
• Don’t let technology capabilities dictate policy
• HAVE a policy
• Enforce that policy but pick your battles – what’s really important?
• It’s still about productivity first – the internet is the student application, it may not be for you
• No amount of MDM, Endpoint control or NAC on top of “bad” design will help
• There is no such thing as a supportless model – you WILL have to do it
• Take steps with what you already have – there is so much unused capability
• Don’t lump BYO and mobility in together – they are distinct
8
9. Multi – Tenancy, isn’t that just using your infrastructure?
The Enterprise Picture
• Cloud service provision and consumption is driving multi-tenancy models
• Reduced funding in traditionally recalcitrant sectors (finance) is changing opinions
• Network design has moved on – things like SDN have caused a re-examination
• In parallel, refresh cycles are being pushed up to and beyond EOL notifications
• “Doing more with less” is a recurring theme
• Space, power, cooling – much more relevant in a recession
Suddenly this all means REAL money to enterprise
9
10. The “internet of things”
It’s the new BYO!
• Kevin Ashton, MIT coined the term in 1999 – the vision was ubiquitous RFID
• Asset tracking was the first practical use
How does it look today?
• APIs and Service Buses, effectively
Why is enterprise suddenly excited by it?
• Smart metering
• Connected cars
• Buildings Management Systems
• Power and cooling micro-control
Why is enterprise suddenly excited by it then?
10
18. Big Science >> Big Data >> Big IT
1913 Panama Canal (40,000 people – warning, this may be engineering!)
1939 ULTRA decoding project at Bletchley Park (10,000 people)
1942 The Manhattan Project (130,000 people)
1969 The Apollo Project (400,000 people)
2002 Alzheimer’s Disease Neuroimaging Initiative (ADNI; 30,000 people, 90 orgs)
2003 Human Genome Sequencing (100,000 people, 120 countries)
2008 Large Hadron Collider (10,000 people, 100 countries)
Real-time collaboration, instant result sharing
Academic and Research projects In HE force innovation and create markets
HE Leads the way in developing HPC, and “big” data analysis – Hadoop is open source
18
19. Academic and Research projects In HE force innovation and create markets
• Cloud computing (Virtualisation, HPC, Orchestration, NAC)
• IPv6 ratification (through IETF membership) and early adoption
• Big Data (Hadoop / MapReduce techniques)
• Collaboration on an enormous scale, without the travel (research, VLE, MOOC)
• Performance demands (speed, density, distance and quality control)
• BYO (endpoint control, service delivery, session tracking and reporting)
19
20. Thankyou – we (really) couldn’t do it without you..
Next Generation Security
• Application visibility and control (Web 2.0 issues). You should have security and privacy safeguards that are fit-for-purpose in the age of Facebook, Twitter,
LinkedIn and other social networks. They should also be able to securely enable WebEx, Instant Messaging, remote diagnostics and other technologies that bypass
traditional communication protocols.
• Endpoint protection and data leak prevention. As laptops, smartphones, tablets and other devices become an everyday business tool, they are now accessing
potentially sensitive information that needs to be protected wherever it is distributed to.
• Regulation and compliance (Governance). Most businesses are affected by regulation to some extent. The need to maintain compliance is essential to protect
information and avoid financial penalties or reputational damage.
• Malware attack. The Internet is replacing email as the primary channel for distribution and communication. Malware that is script-based can evade traditional / common
antivirus and anti-malware software because of its inherent signature-based weaknessNext Generation Security
Mobile and BYO
• monitor and manage your mobile devices (MDM);
• backup and restore data;
• protect against virus and malware attack;
• mitigate against loss or theft (GPS location remote wipe / remote locking);
• control spam and other unwanted traffic (content management).
Network Consolidation
• Eliminating layers of switching to flatten and collapse the network from today’s 3-tier architecture to 2 layers and, ultimately, to just 1.
• Simplification; achieved by interconnecting multiple physical switches, creating a single, logical device that combines the performance and simplicity of a switch with the
connectivity and resilience of a network.
• Reduction of complexity and acceleration of performance by the creation of a single data centre-wide fabric that provides any-to-any connection.
• Cost and emissions; you can expect to see up to a 40% reduction in power consumption, a 30% reduction in heat output and a 20% increase in mean time between
failure (MTBF) of major network components.
20